Search Results

Search found 32459 results on 1299 pages for 'internet connection'.

Page 63/1299 | < Previous Page | 59 60 61 62 63 64 65 66 67 68 69 70  | Next Page >

  • Halloween: Season for Java Embedded Internet of Spooky Things (IoST) (Part 4)

    - by hinkmond
    And now here's the Java code that you'll need to read your ghost sensor on your Raspberry Pi The general idea is that you are using Java code to access the GPIO pin on your Raspberry Pi where the ghost sensor (JFET trasistor) detects minute changes in the electromagnetic field near the Raspberry Pi and will change the GPIO pin to high (+3 volts) when something is detected, otherwise there is no value (ground). Here's that Java code: try { /*** Init GPIO port(s) for input ***/ // Open file handles to GPIO port unexport and export controls FileWriter unexportFile = new FileWriter("/sys/class/gpio/unexport"); FileWriter exportFile = new FileWriter("/sys/class/gpio/export"); for (String gpioChannel : GpioChannels) { System.out.println(gpioChannel); // Reset the port File exportFileCheck = new File("/sys/class/gpio/gpio"+gpioChannel); if (exportFileCheck.exists()) { unexportFile.write(gpioChannel); unexportFile.flush(); } // Set the port for use exportFile.write(gpioChannel); exportFile.flush(); // Open file handle to input/output direction control of port FileWriter directionFile = new FileWriter("/sys/class/gpio/gpio" + gpioChannel + "/direction"); // Set port for input directionFile.write(GPIO_IN); } /*** Read data from each GPIO port ***/ RandomAccessFile[] raf = new RandomAccessFile[GpioChannels.length]; int sleepPeriod = 10; final int MAXBUF = 256; byte[] inBytes = new byte[MAXBUF]; String inLine; int zeroCounter = 0; // Get current timestamp with Calendar() Calendar cal; DateFormat dateFormat = new SimpleDateFormat("yyyy/MM/dd HH:mm:ss.SSS"); String dateStr; // Open RandomAccessFile handle to each GPIO port for (int channum=0; channum And, then we just load up our Java SE Embedded app, place each Raspberry Pi with a ghost sensor attached in strategic locations around our Santa Clara office (which apparently is very haunted by ghosts from the Agnews Insane Asylum 1906 earthquake), and watch our analytics for any ghosts. Easy peazy. See the previous posts for the full series on the steps to this cool demo: Halloween: Season for Java Embedded Internet of Spooky Things (IoST) (Part 1) Halloween: Season for Java Embedded Internet of Spooky Things (IoST) (Part 2) Halloween: Season for Java Embedded Internet of Spooky Things (IoST) (Part 3) Halloween: Season for Java Embedded Internet of Spooky Things (IoST) (Part 4) Hinkmond

    Read the article

  • The State of the Internet -- Retail Edition

    - by David Dorf
    Over at Business Insider, there's a great presentation on the State of the Internet done in the Mary Meeker style.  Its 138 slides so I took the liberty of condensing it down to the 15 slides that directly apply to the retail industry.  However, I strongly recommend looking at the entire deck when you have time.  And while you're at it, Business Insider just launched a retail portal that's dedicated to retail industry content.  Please check it out as well.  My take-aways are below after the slide show. &amp;amp;amp;amp;lt;span id=&amp;amp;amp;amp;quot;XinhaEditingPostion&amp;amp;amp;amp;quot;&amp;amp;amp;amp;gt;&amp;amp;amp;amp;lt;/span&amp;amp;amp;amp;gt; [Source: Business Insider] Here are a few things I took away from the statistics: Facebook and Twitter are in their infancy.  While all retailers should have social programs, search is still the driver and therefore should receive the lions share of investment.  Facebook referrals are up 92% year-over-year, but Google still does 80% of the referrals. E-commerce continues to grow at breakneck speed, but in-store commerce is still king. Stores are not showrooms yet.  And social commerce pure-plays like Gilt and Groupon are tiny but worthy of some attention. There are more smartphones than PCs on the internet, and the disparity will continue to grow. PC growth will be flat and Tablet use will continue to grow. Mobile accounts for 12% of all internet traffic. A quarter of smartphone sales come from China, so anyone with a presence there better have a strong mobile strategy. 38% of people have used their smartphone to make a purchase, and many use their smartphones inside stores.  Smartphones are a critical consumer tool for shopping. Mobile is starting to drive significant traffic to e-commerce sites, especially tablets.  Tablet strategies are crucial for retailers. Mobile payments from the likes of Paypal and Square are growing quickly.  It will be interesting to see how NFC plays in this area. Mobile operating systems are losing market share to iOS and Android.  I wonder in Microsoft can finally make a dent? The internet is being dominated by mobile devices, and retailers had better have a strong mobile strategy to meet consumer demand.

    Read the article

  • Beware & Be Aware Of Internet Scams

    Internet has many advantages. It provides mankind all the information he needs right from the dust to the boundless sky. It has brought mankind together, which helped eliminating distances between pe... [Author: Francis Regan - Computers and Internet - April 10, 2010]

    Read the article

  • How to direct Ubuntu to use USB connection for Internet

    - by t3ch
    Hi folks, I posted yesterday regarding how to configure easytether on Ubuntu. I followed the steps and everything looks good from the terminal. But I am not able to connect to the Internet. Currently I am connected to a Wireless network, I tried disconnecting to it, in hope to connect to Internet using my phone but with no help. How do I make my notebook use my cell phone's connection. I have attached the snapshot from the terminal.

    Read the article

  • keeping connection open all time in sql

    - by Costi
    I have developed a Windows application in c# in which multiple users can add some numbers and their name and can view the data entered. The problem that I have is that the sever is on my laptop and every time I log off or close my laptop, they are losing connection to the DB and can not add or view any more. It seems that the port is closed or something. Is there a way to keep the port and their connection established all the time even when I'm logging out?

    Read the article

  • Pro xy to Direct Connection

    - by Shivam Verma
    I use a Proxy Server with LDAP Authentication for accessing internet. So I need to manually add Server Address and Port in every application that has to connect to internet. Any methods by which I dont need to enter proxy address in my applications ? ( I have entered the authentication and proxy details at : apt.conf and changed the environment variables too. Firefox still asks for username pwd every time I connect)

    Read the article

  • Internet Explorer 10 moins vulnérable que ses concurrents, Microsoft détaille les fonctions de sécurité du navigateur

    Internet Explorer 10 moins vulnérable que ses concurrents Microsoft détaille les fonctions de sécurité du navigateurLe mois dernier, une étude du cabinet NSS Labs a montré qu'Internet Explorer 10 était plus sûr que n'importe lequel de ses concurrents, en ce qui concerne la protection des utilisateurs contre les téléchargements dangereux.L'analyse, portant essentiellement sur la fonction SmartScreen du navigateur, a permis de constater qu'IE 10 sous Windows 8 était capable de bloquer près de 99,96 % des téléchargements de programmes malveillants.Le navigateur dispose cependant de plusieurs autres évolutions dans le domaine de la s...

    Read the article

  • How To Choose Right Internet Fax Service?

    To choose the right Internet fax service, you will have to necessarily do some pre-study. You must review the different service provider companies, their reliability and track record, pricing etc. Yo... [Author: James Allen - Computers and Internet - April 12, 2010]

    Read the article

  • Google sortira des plug-ins pour Safari et Internet Explorer afin que ceux-ci supportent WebM

    Google sortira des plug-ins pour Safari et Internet Explorer Afin que ceux-ci supportent WebM Google annonce qu'il va bientôt sortir des plug-ins pour Safari et Internet Explorer qui permettront à ces navigateurs de supporter les vidéos au format WebM. Cette annonce fait suite à de nombreuses critiques qu'auraient reçu la firme après sa décision d'abandonner la prise en charge du codec video H.264 dans son navigateur Google Chrome. Pour mémoire la firme avait annoncé il y a juste quelque jours l'arrêt d...

    Read the article

  • Troubleshooting Internet Explorer 7.0 Issues

    Introduction: Internet Explorer 7 (IE7) is light years ahead of its predecessors, but by no means does that proclamation mean that the browser is perfect. You are still going to encounter issues wit... [Author: SalemHassan - Computers and Internet - September 03, 2009]

    Read the article

  • Le trafic internet d'Android dépasse celui de l'iPhone aux Etats-Unis d'après AdMob, une première

    Mise à jour du 28/04/10 NB : Les commentaires sur cette mise à jour commencent ici dans le topic Le trafic internet d'Android dépasse celui de l'iPhone Aux Etats-Unis d'après AdMob, une première Les plus suspicieux diront qu'AdMob, société de mesure d'audience Internet, est très liée à Google. Quoi qu'il en soit, d'après ses chiffres, le trafic web généré par l'OS de Google a pour la première fois dépassé celui de l'iPhone aux États-Unis. [IMG]http://ftp-develo...

    Read the article

  • Brief About Internet Marketing Services

    Internet Marketing Services have become the nectar through which websites and products and ideas being sold in the market are able to carry themselves forward. Websites are able to survive and do business solely because of the fact that the internet marketing services that they get fed with give them the needed exposure and also the leverage to show the web world what they really are and further, also displaying their charisma and ability to draw clients with whom they can do a lot of business.

    Read the article

  • Ubuntu 12.04 - PPTP VPN is the only Internet Access

    - by user212553
    I know this has been covered. I've read dozens of posts but still have questions. I have a work server whose traffic should never leave my house without encryption. The VPN is PPTP. Currently I have a cron job that checks the status of the ppp0 adapter each minute. If the connection drops, which it does fairly often, it shuts key components down. It's fairly easy to restart PPTP with "nmcli con up id 'myVPNServer'" but there's no assurance it will reconnect and I need a better way to stop traffic (other than killing apps) when ppp0 is down. The two options I've seen discussed are the firewall (UFW, Firestarter, IPTables) or the route tables. I could be easily swayed to consider the firewall option but I focused on the route tables since no new function needs to be started. My questions involve the way the route tables change and then specifics on rules. When I start the PPTP VPN the route tables change. That suggests that if the VPN drops, the table will change back, defeating my stated intent of preventing external traffic. How can I make "sticky" changes to the route table that will persist even if the VPN connection drops? Perhaps the check boxes "Ignore automatically obtained routes" or "Use this connection only for resources on it's network" (which are part of the VPN configuration options)? It would seem that, if I can force the active VPN route table to stay in effect, even when the VPN drops, that this will effectively kill any external traffic should the VPN drop. This will give me the latitude to run a routine to restart the VPN from the command line (assuming the route table rules don't prevent me re-establishing the connection). My route table, with the VPN active is (ip route list): Any comments on what 10.10.1.1 is? $ ip route list default dev ppp0 proto static 10.10.1.1 dev ppp0 proto kernel scope link src 10.10.1.11 VPN_Server_IP_Address via 192.168.1.1 dev eth0 proto static VPN_Server_IP_Address via 192.168.1.1 dev eth0 src 192.168.1.60 169.254.0.0/16 dev eth0 scope link metric 1000 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.60 metric 1

    Read the article

  • Design Better, Rich Internet Applications

    As you know, Rich Internet Applications are web-based software programs that behave and operate like a desktop application. These may be delivered through a site-specific browser, a browser plug-in, or through other methods; they are especially useful for massively-multiplayer online role-playing games (MMORPGs). RIA training can be especially useful in learning the tools that are used for designing and developing these increasingly-necessary additions to Internet Web Sites.

    Read the article

  • Basic Knowledge of SEO in Internet Marketing

    Internet marketing is an effective way of promoting one's business or site. However, unless one is a specialist in web marketing, it is always good to hire a reliable company that deals with internet marketing. This is because such companies are likely to have professionals who are in a position to help you in promoting the site. By promoting your site, you increase its ranking in the SEO results page, which is the essence of the whole thing.

    Read the article

  • Promising Future For Internet Marketing Company

    Prospects for Internet marketing companies in the field of e-commerce are bright these days and the trend is likely to continue. It does not mean that anyone and everyone starting an Internet marketing company will have the same amount of success. Success in e-commerce depends on a number of factors.

    Read the article

  • SEO Company For an Easy Implementation of Internet Marketing

    It would be safe to say that Internet Marketing is now a well-known term, especially to those who own their websites and in need of marketing to drive more traffic to their pages. Online business specifically requires Internet Marketing for the productivity of their venture, though not many have a team of experts to accommodate their target goals.

    Read the article

  • Cyber Stalkers and the Internet - Know the Dangers

    Many people perform a variety of functions on the internet. There';s nowhere else you can bank, pay bills, shop and meet people all with the click of a few buttons. The reason so many people choose th... [Author: Ed Opperman - Computers and Internet - June 14, 2010]

    Read the article

  • "Utiliser Internet Explorer 6, c'est comme boire du lait périmé", déclare Microsoft dans une campagn

    Mise à jour du 17.05.2010 par Katleen "Utiliser Internet Explorer 6, c'est comme boire du lait périmé", déclare Microsoft dans une campagne demandant la migration vers IE8 Microsoft Australie frappe fort avec une campagne publicitaire dissuasive, qui vise mettre un frein voir stopper l'utilisation de l'un de ses anciens produits : Internet Explorer 6. L'éditeur conseille la migration vers la version 8, qu'il considère comme le navigateur le plus sécurisé du marché. Bien que le support d'IE6 soit assuré jusqu'en 201...

    Read the article

  • I upgraded ubuntu to 12.10, and the internet does not work on vbox

    - by user100607
    Last week, I upgraded my operating system to Ubuntu 12.10 from 12.04, and the internet stopped working on two virtual machines (launched with virtualbox), Windows XP and OSX Snow Leopard. OSX also stopped working completely at first, but I fixed that by switching to the 64 bit option in the vbox settings. I switching to bridged networking from NAT restored the internet to Windows, but not to OSX. Does anybody know what I could be doing wrong?

    Read the article

< Previous Page | 59 60 61 62 63 64 65 66 67 68 69 70  | Next Page >